<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; policy</title>
	<atom:link href="https://privacyriskreport.com/tag/policy/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</title>
		<link>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach</link>
		<comments>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/#comments</comments>
		<pubDate>Thu, 04 Oct 2018 19:08:20 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1673</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While some courts have found coverage for data breach claims under CGL policies, there should be little dispute that the best way to limit risk is to obtain a cyber policy rather than hoping for coverage under a CGL policy.... <a class="more-link" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><a href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/" target="_blank">While some courts have found coverage for data breach claims under CGL policies</a>, there should be little dispute that the best way to limit risk is to obtain a cyber policy rather than hoping for coverage under a CGL policy.</p>
<p>The decision in <em>St. Paul Fire &amp; Marine Ins. Co. v. Rossen Millennium, Inc</em>., case no. 17-cv-540, provides the latest example of a court finding no coverage for a data breach under a commercial general liability insurance policy (“CGL”).  In <em>Rosen Millennium</em>, the Federal District Court for the Middle District of Florida issued an order on September 28, 2018, finding no coverage for a data breach under two CGL policies issued to defendant, Rosen Millennium (“Rosen”).</p>
<p>Rosen was providing data security services to Rosen Hotels &amp; Resorts (“RHR”) when they discovered a potential breach of credit cards at a hotel in February of 2016.  The forensic investigator determined information related to the credit cards provided by hotel patrons was breached and RHR took steps to notify the patrons in March of 2016.</p>
<p>Rosen submitted a notice of claim to its insurer, St. Paul Fire &amp; Marine (“Travelers”) in December of 2016, which stated RHR claimed the breach was the result of Rosen’s negligence. Travelers issued a reservation of rights denying coverage and requesting Rosen provide any information it believes may impact St. Paul’s coverage determination. Shortly thereafter, Travelers filed this declaratory seeking a determination of its duty to defend Millennium against RHR’s negligence claims.  Even though RHR did not file suit, they claimed a demand letter from RHR and Millennium’s Notice of Claim and created a controversy as to Traveler’s duty to defend Millennium under the CGL policies.</p>
<ul>
<li><strong>The Allegations Against Rosen Did Not Constitute “Property Damage” Under the CGL Policies</strong></li>
</ul>
<p>In granting Traveler’s motion for summary judgment, the District Court first opined that the Notice of Claim (which contained only the relevant dates of the breach) and demand letter (which provided only that Rosen exposed private information to third parties) did not trigger Traveler’s defense obligation under the policy.  In particular, the District Court found these documents “make no mention of, let alone a claim for, property damage or the costs incurred from complying with notification statutes.”  Consequently, the District Court found Rosen’s claims for coverage not ripe and held Travelers had no “duty to defend a hypothetical claim.”</p>
<ul>
<li><strong>The Allegations Against Rosen Did Not Constitute “Personal Injury” Under the CGL Policies</strong></li>
</ul>
<p>The District also rejected Rosen’s assertion that RHR’s allegations constituted “personal injury” as that term is defined under the CGL Policies.  In particular, the CGL Policies defined personal injury as “injury, other than bodily injury or advertising injury, that’s caused by a personal injury offense.”  And, the CGL policies defined “personal injury offense” as “[m]aking known to any person or organization covered material that violates a person’s right of privacy.” The central question in the District Court’s analysis is whether the material, or personal information, was “made known” by Rosen and, therefore, constitutes a personal injury offense.  Both parties agreed “making known” “is synonymous with ‘publication.’”</p>
<p>In addressing this question, Travelers argued that the allegations against Rosen do not constitute publication because “third-party data breaches are not covered under” CGL policies. That is, there is no coverage because the alleged injuries do not result from Rosen’s “business activities but rather the actions of third parties.”  In other words, there is no coverage for these claims because, if there was a publication, the publication was not done by the insured, Rosen.</p>
<p>This decision serves as another reminder that only a sliver of the data breach cases even arguably trigger coverage under a CGL policy. On the other hand, the insurance marketplace has solved the problem Rosen faced in this matter by offering cyber insurance policies that are specifically designed to provide cyber coverage.</p>
<p>Please contact <a href="https://www.tresslerllp.com/attorneys/attorney-details/todd-rowe" target="_blank">Todd M. Rowe</a> (trowe@tresslerllp.com) for additional questions or for a copy of this decision.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/' data-emailit-title='Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/">Another Court Finds No Coverage Under CGL Insurance Policy for Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/another-court-finds-no-coverage-under-cgl-insurance-policy-for-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tick Tock: A GDPR Primer To Meet The Deadline Next Week</title>
		<link>https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week</link>
		<comments>https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/#comments</comments>
		<pubDate>Fri, 18 May 2018 17:32:15 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1509</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/' data-emailit-title='Tick Tock: A GDPR Primer To Meet The Deadline Next Week'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Discussions on privacy laws have taken front and center in recent weeks as European Union (EU) member states begin enforcing the General Data Protection Regulation (“GDPR”) on May 25, 2018.  As we have been discussing for a while, there is... <a class="more-link" href="https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/' data-emailit-title='Tick Tock: A GDPR Primer To Meet The Deadline Next Week'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/">Tick Tock: A GDPR Primer To Meet The Deadline Next Week</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/' data-emailit-title='Tick Tock: A GDPR Primer To Meet The Deadline Next Week'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Discussions on privacy laws have taken front and center in recent weeks as European Union (EU) member states begin enforcing the General Data Protection Regulation (“GDPR”) on May 25, 2018.  <a href="https://privacyriskreport.com/ironing-out-the-wrinkles-in-data-legislation-a-case-study/" target="_blank">As we have been discussing for a while</a>, there is confusion as data collectors try to figure out the impact of this legislation.  There is no question that large, multi-national corporations will have to comply and many of these corporations are already in compliance.  However, with this deadline just around the corner, smaller companies that do not actively target EU residents are struggling with how this legislation impacts them.</p>
<p>Until all these laws are harmonized, the safest route for smaller companies may be to comply with GDPR, state, federal, local and industry regulations as much as possible. While the GDPR deadline is looming, it is worthwhile for smaller data collectors to consider the following:</p>
<p><strong>GDPR Overview</strong></p>
<p>The GDPR website states this legislation “replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy.”  (A guide to the EU GDPR can be found<a href="https://www.eugdpr.org/" target="_blank"> here</a>.)</p>
<p>Importantly, GDPR will apply to all data collectors holding the personal data of EU residents regardless of the location of the data collector.  The definition of personal data is broadened to the extent to include any information “that can be used to directly or indirectly identify the person.”  Therefore, under GDPR, this information can include “anything from a name, a photo, an email address, bank details, posts on social networking websites, medical information, or a computer IP address.”</p>
<p>GDPR also imposes new obligations on how the data is to be handled and stored.  For example, EU residents will have a “right of access” that requires data collectors to provide specific details about how information is processed.  GDPR grants EU residents a right to have their personal data deleted or erased by a data collector upon their request. The penalties for non-compliance may total anywhere from 4% of the annual global turnover of the breaching data collector or €20 Million (whichever is greater).</p>
<p><strong>Should We be Concerned About GDPR Regulations?</strong></p>
<p>We have been getting questions from our clients about how GDPR may impact them.  The knee-jerk reaction from many American companies appears to be to ignore GDPR if their business is not focused on EU residents.  Admittedly, there are many questions concerning how GDPR regulations can be enforced on data collectors outside of the European Union. Of course, betting on the fact that the EU will not be able to broadly enforce these regulations is not the best strategy.</p>
<p>The consensus is that general marketing to customers that may include EU residents will not trigger an obligation under the GDPR.  Rather, it appears at this time, that EU residents will need to be directly targeted for GDPR to apply to data collectors outside the United States.  <a href="https://www.forbes.com/sites/forbestechcouncil/2017/12/04/yes-the-gdpr-will-affect-your-u-s-based-business/2/#297abf1849a9" target="_blank">Commentators have provided the following analysis</a> on this issue:</p>
<p><em>For example, a Dutch user who Googles and finds an English-language webpage written for U.S. consumers or B2B customers would not be covered under the GDPR. However, if the marketing is in the language of that country and there are references to EU users and customers, then the webpage would be considered targeted marketing and the GDPR will apply.</em></p>
<p><em>Accepting currency of that country and having a domain suffix &#8212; say a U.S. website that can be reached with a .nl  from the Netherlands &#8212; would certainly seal the case.</em></p>
<p>Even if GDPR compliance may not be a priority for smaller data collectors, it is still worthwhile at this time for data collectors to consider compliance for the following reasons:</p>
<p><em>&#8211; GDPR compliance is not costly</em>. At this point, compliance may be adding a few new disclosures to their website.</p>
<p><em>&#8211; GDPR compliance has a positive impact for customers that trust you with their data</em>. Even if large, multi-national corporations have the most at stake, working toward GDPR compliance will only make data safer.  Keeping data safe may result in more business and cutting losses related to a cyber incident.</p>
<p><em>&#8211; GDPR compliance puts you ahead of the pack</em>. There is no doubt that the GDPR regulations are the most-strict and punitive we have seen to date.  However, GDPR compliance is only going to help data collectors comply with state, federal and industry standards that they may already be required to follow.  Further, if the GDPR is successful, data collectors can be certain the U.S. will adopt similar standards.</p>
<p><strong>The Initial, Practical Approach To GDPR Compliance</strong></p>
<p>Now that it is clear that GDPR compliance may be a concern even for data collectors that are not necessarily targeting EU residents, a discussion as to the potential for liability can be guided by the following points:</p>
<ol>
<li><strong>Data Inventory. </strong>Data collectors need to first inventory the information and data that is being collected. A website that collects names and emails of visitors may gather EU resident&#8217;s data occasionally, but may not target the European Union for business.  A data collector cannot thoroughly access liability without taking stock of the origin of the collected data.</li>
<li><strong>Consent? </strong>While it is still early in the process of GDPR compliance, it is assumed that most data collectors will find there is a peripheral chance that data belonging to an EU resident will be collected.  This is the proper time to determine whether consent should be obtained from all individuals providing any data or information.  Consent does not have to be an elaborate policy that no one would want to read (we are looking at you Apple).  Rather, consent can be obtained through clear language without legalese.  From a practical standpoint, data collectors may want to use a website such as <a href="https://secureprivacy.ai/" target="_blank">SecurePrivacy.AI,</a> which has recently begun offering a free tool that scans websites for GDPR compliance</li>
<li><strong>Data/Privacy Officer. </strong>Reviewing GDPR compliance also provides an opportunity to consider whether a data/privacy officer should be appointed. This person will be responsible for handling data and information retention issues and would be a point of contact for anyone worried about how their data was gathered, used or retained.</li>
</ol>
<p>The issues concerning GDPR are not new.  Data collectors have been struggling with compliance with federal, state, local and industry data collection requirements for years.  For example, an employer in Chicago, Illinois may hold information for its employees that are residents of Illinois, Wisconsin or Indiana.  This employer may have been trying to harmonize privacy regulations for years at this point.  Consequently, data collectors should use GDPR as another opportunity to access the safeguards they have in place to protect data.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/' data-emailit-title='Tick Tock: A GDPR Primer To Meet The Deadline Next Week'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/">Tick Tock: A GDPR Primer To Meet The Deadline Next Week</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Line Between Obligations To Disclose Information And Obligations To Protect Private Information</title>
		<link>https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information</link>
		<comments>https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/#comments</comments>
		<pubDate>Fri, 29 Sep 2017 20:41:23 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[private]]></category>
		<category><![CDATA[private data]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1327</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/' data-emailit-title='The Line Between Obligations To Disclose Information And Obligations To Protect Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>For many years, governmental bodies and some commercial companies have had a responsibility to provide information conveniently to the public.  Specifically, under Open Records Acts, Freedom of Information Action requests and other similar requirements, many governmental bodies have to provide... <a class="more-link" href="https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/' data-emailit-title='The Line Between Obligations To Disclose Information And Obligations To Protect Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/">The Line Between Obligations To Disclose Information And Obligations To Protect Private Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/' data-emailit-title='The Line Between Obligations To Disclose Information And Obligations To Protect Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>For many years, governmental bodies and some commercial companies have had a responsibility to provide information conveniently to the public.  Specifically, under Open Records Acts, Freedom of Information Action requests and other similar requirements, many governmental bodies have to provide sensitive information to the public.  However, over the last few years, these same governmental bodies and commercial companies have also started to face additional requirements to adopt cyber security safety measures to protect data.  It is not difficult to see how these various requirements may become competing interests that cause confusion.  Therefore, we are starting to see new methods to address the need to provide information to the public in a convenient format while properly securing information.</p>
<p>One recent example of the need to strike a balance between providing information and safeguarding information is seen in <em>Taylor v. School Administrative Unit #55</em>, 2017 WL 4172944 (September 21, 2017), when the New Hampshire Supreme Court found providing information on a thumb drive, rather than through email, was acceptable given the cyber security concerns in protecting that information.</p>
<p>On May 12, 2016, the School Administrative Unit #55 (“School District”) voted to go into a nonpublic session to discuss the superintendent’s evaluation and “emergency functions.”  The School District voted to seal the minutes while in the nonpublic session.  The following month, the plaintiff, David Taylor, requested the superintendant’s office send him the minutes of the May 12, 2016 nonpublic session. Taylor was told the minutes could not be provided because they were sealed.  In response to a second email sent by Taylor, the superintendent’s office denied the request based on the School District’s “Right-To-Know” procedure which allowed records to only be provided  to a member of the public that brings a sealed thumb drive (or purchases a thumb drive directly from the School District) for the records to be downloaded.</p>
<p>By August of 2016,  Taylor had filed a complaint initiating this lawsuit based on allegations that the School District had violated New Hampshire law by voting in a closed session to seal the minutes of the nonpublic meeting and “refusing to forward to him, by email, the records he requested.” Taylor sought a declaration that the School District’s policy requiring information to be downloaded on a thumb drive violated New Hampshire and an order requiring the records be transferred via email.</p>
<p>The School District argued a number of “cyber security concerns” validated its procedure for using thumb drives rather than transferring the information through email. In agreeing with the School District, the New Hampshire Supreme Court held “we find valid the [School District’s] concern that responding to records requests by e-mail ‘would introduce unreliability into the process because sometimes e-mails are too big to be received, and there is no way for the [School District] to confirm receipt of e-mails it sends.” The Supreme Court was further concerned over the potential for mistakes once the School District started sending a number of responses to “Right-To-Know” requests via email.  Specifically, the Supreme Court agreed with the trial court’s finding that “while plaintiff may be correct that the simple forwarding of one email poses a very small cyber security risk, the greater potential risk comes from repeated email exchanges with multiple parties making Right-To-Know-Requests.&#8221;  Further, the Supreme Court held that the thumb drive policy did not necessarily diminish the use of records provided on thumb drives and “serves the governmental interest of protecting public bodies’ and agencies’ information technology systems…”</p>
<p>Governmental bodies have to walk a thin line between the need to make information available to the public and the need to have cyber security safeguards in place to protect the public. Here, the School District was required to provide access to information, but it also had a fiduciary duty to protect private information.  The School District’s agreement to provide the requested information on a thumb drive provides another example of how entities can use all available technology to overcome cyber security concerns.  While downloading data to a thumb drive may not be the most convenient method to provide this information, it allowed the School District to meet is fiduciary obligation to protect information.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/' data-emailit-title='The Line Between Obligations To Disclose Information And Obligations To Protect Private Information'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/">The Line Between Obligations To Disclose Information And Obligations To Protect Private Information</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/the-line-between-obligations-to-disclose-information-and-obligations-to-protect-private-information/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Square Pegs:  Recent Case Shows Problems With Fitting Cyber Liability Claims Into Law That Is &#8220;A Bit Dated&#8221;</title>
		<link>https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated</link>
		<comments>https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/#comments</comments>
		<pubDate>Fri, 07 Jul 2017 16:36:31 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[electronics communicatons act]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1249</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/' data-emailit-title='Square Pegs:  Recent Case Shows Problems With Fitting Cyber Liability Claims Into Law That Is &#8220;A Bit Dated&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Many litigants are struggling with how to fit the &#8220;square peg&#8221; of cyber security claims into the &#8220;round hole&#8221; of law that may have been around for a number of decades.  One recent example was seen on June 27, 2017, when... <a class="more-link" href="https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/' data-emailit-title='Square Pegs:  Recent Case Shows Problems With Fitting Cyber Liability Claims Into Law That Is &#8220;A Bit Dated&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/">Square Pegs:  Recent Case Shows Problems With Fitting Cyber Liability Claims Into Law That Is &#8220;A Bit Dated&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/' data-emailit-title='Square Pegs:  Recent Case Shows Problems With Fitting Cyber Liability Claims Into Law That Is &#8220;A Bit Dated&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Many litigants are struggling with how to fit the &#8220;square peg&#8221; of cyber security claims into the &#8220;round hole&#8221; of law that may have been around for a number of decades.  One recent example was seen on June 27, 2017, when the United States District Court for the Central District of California dismissed a case entitled <em>Casillas v. Berkshire Hathaway Homestate Companies, et al</em>., 15-04763, 2017 WL 2813145 (June 27, 2017). In <em>Casillas</em>, the plaintiffs alleged two insurance investigators hacked an online database created by HQSU Sign Up Services, Inc. (&#8220;HQSU&#8221;) which stored workers&#8217; compensation litigation files.  In serving as an “administrative services” contractor to various workers’ compensation attorneys, HQSU stored everything from “personal data” (including the client’s full name, Social Security Number, birth date, home address, legal status, driver’s license information, and salary information) to the attorneys’ communications with their clients and personal notes about the various cases. In particular, the plaintiffs allege that over the course of two years, the investigators accessed and downloaded over 30,000 workers’ compensation files.  The complaint further alleges the hackers took this information to provide the insurance companies with “a counsel’s advantage” in pending litigation and to “intimidate and force concessions” from various plaintiffs.</p>
<p>The <em>Casillas</em> Court closely analyzed what is necessary to bring a viable cause of action under <a href="https://www.law.cornell.edu/uscode/text/18/2701">18 U.S.C. § 2701(a)(1),</a> the Stored Communications Act. This Act was designed decades ago to “protect against the unauthorized interception” of “stored wire and electronic communications and transactional records.” The Act creates a private right of action against anyone who:</p>
<p>(1)       “intentionally accesses without authorization”</p>
<p>(2)       a “facility through which an <em>electronic communication service</em> is provided” and</p>
<p>(3)       “thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage.</p>
<p>However, before finding the plaintiffs’ complaint should be dismissed, the Court analyzed what it refers to as the “technical distinction between “electronic communication services” and “remote computing services.” Specifically, in addressing this distinction, the Court held that “&#8230;though they aren’t mutually exclusive categories, the Act establishes ‘different standards of care” for different types of communication.’” The Court provides the following distinction between these two phrases:</p>
<ul>
<li><strong>Electronic Communications Service</strong>: “Congress defined an ‘electronic communication service’ as ‘any service which provides to users thereof the ability to send or receive wire or electronic communications.’ Think email: ‘[C]ommunication by which private correspondence is &#8230; typed into a computer terminal, and then transmitted over telephone lines to a recipient computer operated by an electronic mail company.’”</li>
<li><strong>Remote Computing Service</strong>: “A ‘remote computing service,’ by contrast, is one that ‘provi[des] to the public [a] computer storage or processing service[ ] by means of an electronic communications system.’ Think off-site storage: ‘In the age of rapid computerization, &#8230; remote computer service companies have developed to provide sophisticated and convenient computing services to subscribers and customers from remote facilities.’”</li>
</ul>
<p>Indeed, this importance of this distinction is seen firsthand as the portion of the Act which the plaintiffs sought relief under, 18 U.S.C. § 2701(a)(1), “applies only to the provision of electronic communication services, and therefore excludes the provision of remote computing services from its strictures.” The <em>Casillas</em> court found plaintiffs’ complaint was limited to allegations that their attorneys “used HQSU’s administrative services in a limited fashion—by ‘uploading and downloading documents’ to the online database and appending case-related ‘notes’ to those documents.” These allegations, the court opined, describe “remote computing service” which does <em>not</em> give rise to a private cause of action under the Act. In conclusion, the court found “it’s plain that the plaintiffs have mixed up their claims under the Stored Communications Act.</p>
<p>Litigants bringing claims related to cyber security, data breaches and privacy not only have to overcome <a href="https://privacyriskreport.com/p-f-changs-leftovers-district-court-refuses-to-address-motion-to-dismiss-again-after-seventh-circuit-finds-plaintiffs-have-standing-in-data-breach-case/" target="_blank">significant hurdles to establish standing</a>, but often have to work with law that was developed before the technology was developed that forms the basis for their claims.   Admittedly, it may be difficult to seek relief for damage caused by modern technology under laws that precede this technology by decades.  Even though the <em>Casillas</em> court acknowledges the distinction between &#8220;electronic communication services&#8221; and &#8220;remote computing services&#8221; may be &#8220;a bit dated,&#8221; the parties still must meet the requirements for a viable action under the Act.  This case demonstrates the complexity with cyber security and privacy claims and the need to retain counsel that has experience in this developing, highly-specialized area.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/' data-emailit-title='Square Pegs:  Recent Case Shows Problems With Fitting Cyber Liability Claims Into Law That Is &#8220;A Bit Dated&#8221;'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/">Square Pegs:  Recent Case Shows Problems With Fitting Cyber Liability Claims Into Law That Is &#8220;A Bit Dated&#8221;</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/square-pegs-recent-case-shows-problems-with-fitting-cyber-liability-claims-into-law-that-is-a-bit-dated/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action</title>
		<link>https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action</link>
		<comments>https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/#comments</comments>
		<pubDate>Fri, 12 May 2017 18:40:15 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Home Depot]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1200</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The litigation arising out of the data breach at Schnuck&#8217;s Markets (&#8220;Schnuck&#8217;s) occurring from December of 2012 through March of 2013 is still providing us with insight as to how courts may treat data breach claims.  The latest development related to this... <a class="more-link" href="https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/">Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p dir="LTR" align="LEFT">The litigation arising out of the data breach at Schnuck&#8217;s Markets (&#8220;Schnuck&#8217;s) occurring from December of 2012 through March of 2013 is still providing us with insight as to how courts may treat data breach claims.  The latest development related to this breach was recently seen in <em>Community Bank of Trenton v. Schnuck Markets</em>, 2017 WL 1551330 (May 1, 2017), when the District Court for the Southern District of Illinois granted Schnuck’s motion to dismiss Trenton’s complaint.</p>
<p dir="LTR" align="LEFT">Trenton, a bank that issued credit cards allegedly compromised in this data breach, filed its complaint seeking recovery for damages based on a theory that it would have instructed its customers to shop elsewhere or use cash or checks for purchases if Schnucks had been more upfront about the security of its data network.  Specifically, Trenton attempted to support its cause of action with allegations &#8220;that they were intended or third-party beneficiaries to the contracts between [Schnucks] and others in the card processing network because [Trenton] received an interchange fee or interest for processing cards.&#8221;　 Trenton’s complaint further alleged that unencrypted data &#8220;was potentially compromised for 2.4 million cards swiped at Schnucks’ stores from December 1, 2012 through March 30, 2013.　 The Complaint alleged Schnucks’ learned of the breach on March 14, 2013, but did not notify the public of the incident until March 30, 2013.　 Trenton claimed that during this time an estimated 340,000 additional cards may have been compromised (based on its calculations that 20,000 cards were being used each day).</p>
<p dir="LTR" align="LEFT">In granting Schnucks&#8217; motion to dismiss, the District Court first analyzed Trenton’s negligence claim brought under Missouri law.  Specifically, Trenton asserted Schnucks should be held liable under Missouri’s data breach notification law (Mo. Rev. Stat. § 407.500).  The District Court rejected Trenton’s argument finding &#8220;the data breach notification statute exclusively bestows the power to prosecute violations upon the Missouri Attorney General.&#8221;　 (&#8220;What is more, the statute does not contemplate a duty or remedies for anything other than a failure to notify.&#8221;)　 The District Court further rejected Trenton’s attempt to establish a private cause of action under Missouri’s breach notification laws by refusing to &#8220;read additional duties into a law carefully crafted by the legislature, particularly where the legislatures of other states have explicitly contemplated additional protections in legislation.&#8221;</p>
<p dir="LTR" align="LEFT">After finding Trenton did not have a private cause of action based on Missouri&#8217;s breach notification laws, the District Court distinguished &#8220;out-of-circuit precedent&#8221; where courts have found defendants had a duty to safeguard data based on a business relationship.  (<em>In re Home Depot, Inc. Customer Data Security Breach Litigation</em>, 2016 WL 2897520 (N.D. Ga. 2016); <em>Target Corp. Data Sec. Breach Litigation</em>, 66 F. Supp.3d 1154 (Minn. D. Ct. 2014); and <em>Sovereign Bank v. BJ&#8217;s Wholesale Club, Inc.,</em> 395 F. Supp.2d 183, 193-96 (M.D. Penn. 2005).  The District Court found these cases unpersuasive because the record in the <em>Home Depot</em> breach litigation suggest &#8220;Home Depot&#8217;s data security conduct&#8230;was egregious and intentional,&#8221; the <em>Target</em> Court relied on provisions that were unique to Minnesota law and the holding in <em>BJ&#8217;s Wholesale Club</em> &#8220;is frankly outdated.&#8221;</p>
<p dir="LTR" align="LEFT">The holding in <em>Schnuck&#8217;s</em> provides clarity that many courts are not willing to find legislatures intended to create a private cause of action out of state breach notification laws. Rather, as pointed out by the <em>Schnucks</em> court, plaintiff&#8217;s may need to show a data breach resulted from the &#8220;egregious and intentional&#8221; conduct seen in the <em>Home Depot</em> breach litigation.  The <em>Schnucks</em> court distinguishes this case from the record in the <em>Home Depot</em> litigation where there was evidence showing Home Depot may have ignored warning signs of poor data security &#8220;and even went so far as to fire tech employees who tried to alert the company to the risks of the poor data security measures.&#8221;</p>
<p dir="LTR" align="LEFT">The cyber security world has dramatically changed since the Home Depot breach and many data collectors have gained a better understanding of the importance of network security.  Therefore, there is less chance that a breach today would be handled in the same manner as the Home Depot breach.  Consequently, plaintiffs may have difficulty showing this level of intentional conduct giving rise to recent data breaches.</p>
<p>&nbsp;</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/' data-emailit-title='Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/">Schnucks Market Decision Discounts Argument That Breach Notification Law Gives Rise To Private Cause Of Action</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/schnucks-market-decision-discounts-argument-that-breach-notification-law-gives-rise-to-private-cause-of-action/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Use of Biometric Data Enters the Courts</title>
		<link>https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=use-of-biometric-data-enters-the-courts</link>
		<comments>https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/#comments</comments>
		<pubDate>Tue, 14 Feb 2017 22:09:52 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[biometric data]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1105</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The Privacy Risk Report has previously reported on the necessity to safeguard personal information such as names, addresses, social security numbers and credit card information to avoid risk resulting from data breaches. The latest trend we are seeing now involves... <a class="more-link" href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/">Use of Biometric Data Enters the Courts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The <em>Privacy Risk Report</em> has previously reported on the <a href="https://privacyriskreport.com/recent-case-sheds-light-on-what-courts-may-find-makes-security-measures-reasonable/" target="_blank">necessity to safeguard personal information</a> such as names, addresses, social security numbers and credit card information to avoid risk resulting from data breaches. The latest trend we are seeing now involves a push by state legislatures to enact new laws that also protect biometric data, such as the Illinois Biometric Information Privacy Act (BIPA).</p>
<p>“Biometrics” defines “the field of science relating to the identification of humans based upon unique biological traits, such as fingerprints, DNA, and retinas” and recently “has produced new ways of conducting commercial transactions.” In particular, the protection of biometrics is a growing concern as this technology is turning up in everything from <a href="https://privacyriskreport.com/apple-watch-poses-a-number-of-new-privacy-risks/">watches that may collect health data</a>, finger-scanners at grocery stores and gas stations to retina scanners for financial transactions. Not only is this technology is here to stay, but it is already involved in litigation across the country.</p>
<p>For example, in <a href="https://privacyriskreport.com/wp-content/uploads/2017/02/Vigil_v_Take_Two.pdf" target="_blank"><em>Vigil v. Take-Two Interactive Software, Inc</em>.</a>, the U.S. District Court for the Southern District of New York found class action plaintiffs lacked standing to bring suit under BIPA for claims related to how their faces were used to create personalized avatars in a video game.</p>
<p><strong>Illinois Biometric Information Privacy Act<br />
</strong></p>
<p>The Illinois legislature enacted BIPA (<a href="http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&amp;ChapterID=57%20">740 Ill. Comp. Stat. 14/1 et seq</a>.), “which sets forth disclosure, consent, and retention requirements for private entities that collect, store, and disseminate biometric data.”</p>
<p>Before reaching its decision to grant Take-Two’s motion to dismiss, the District Court provided the following exhaustive background on BIPA:</p>
<p style="padding-left: 30px;"><em>As the Illinois legislature observed, biometric data are by definition unique, and thus—unlike a credit card number—cannot realistically be changed if they are subject to identity theft. <u>See</u> </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f5&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=SP&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)#co_pp_4b24000003ba5"><em>740 Ill. Comp. Stat. 14/5(c)</em></a><em>. The Illinois legislature was concerned that the failure of businesses to implement reasonable safeguards for such data would deter Illinois citizens from “partaking in biometric identifier-facilitated transactions” in the first place, and would thus discourage the proliferation of such transactions as a form of engaging in commerce. </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f5&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=SP&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)#co_pp_7fdd00001ca15"><em>740 Ill. Comp. Stat. 14/5(e)</em></a><em>. The BIPA represents the Illinois legislature’s judgment that the collection and storage of biometrics to facilitate financial transactions is not in-of-itself undesirable or impermissible; instead, the purpose of the BIPA is to ensure that, when an individual engages in a biometric-facilitated transaction, the private entity protects the individual’s biometric data, and does not use that data for an improper purpose, especially a purpose not contemplated by the underlying transaction. <u>See</u> </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f5&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)"><em>740 Ill. Comp. Stat. 14/5(a–g)</em></a><em>.</em></p>
<p style="padding-left: 30px;"><em>Under the BIPA, a “biometric identifier” is “a retina or iris scan, fingerprint, voiceprint, or scan of hand or face geometry,” while “biometric information” is information based on “biometric identifiers.” </em><a href="http://www.westlaw.com/Link/Document/FullText?findType=L&amp;pubNum=1000008&amp;cite=ILSTC740S14%2f10&amp;originatingDoc=Ifa25e6a0e7ba11e692ccd0392c3f85a3&amp;refType=LQ&amp;originationContext=document&amp;vr=3.0&amp;rs=cblt1.0&amp;transitionType=DocumentItem&amp;contextData=(sc.Search)"><em>740 Ill. Comp. Stat. 14/10</em></a><em>.</em></p>
<p><strong>Take-Two’s Video Game — NBA 2K16</strong></p>
<p>The defendant, Take-Two, collects and uses biometric data for its video games, including NBA 2K16. The plaintiffs allege that they used a feature in the video game “to scan their respective faces to create personalized virtual basketball players, exclusively for in-game play.” The plaintiffs did not allege the images of their faces were used for anything beyond use in their own games. The “MyPlayer” feature was specifically at issue, “which allows a gamer to create a ‘personalized basketball avatar’ based on a three-dimensional rendition of the gamer’s face.”</p>
<p><strong>Plaintiffs’ Claims of BIPA Violations </strong></p>
<p>Plaintiffs claimed that Take-Two’s violations of BIPA included the following:</p>
<ul>
<li>Take-Two did not publicly provide “a retention schedule or guidelines for permanently destroying biometric identifiers;”</li>
<li>Take-Two failed to inform the plaintiffs in writing that their biometric information was being collected;</li>
<li>Take-Two collected biometric information without obtaining a proper release from the plaintiffs;</li>
<li>Take-Two disclosed and disseminated plaintiffs’ biometric information without adequate consent;</li>
<li>Take-Two did not employ “industry-standard reasonable care;” and,</li>
<li>Take-Two profited from plaintiffs’ biometric information.</li>
</ul>
<p><strong>Dismissal of Plaintiffs’ Complaint</strong></p>
<p>Unconvinced by the plaintiffs’ arguments, the District Court granted Take-Two’s motion to dismiss the plaintiffs’ second amended complaint based on a finding that plaintiffs’ lacked standing to bring suit against Take-Two. <a href="https://privacyriskreport.com/seventh-circuit-weighs-in-on-article-iii-standing-for-data-breach-plaintiffs/">As with many data storage cases</a>, plaintiffs’ had to demonstrate they had standing to bring suit. In order to avoid Take-Two’s motion to dismiss, the plaintiffs attempted to support their claims with allegations of procedural violations of BIPA, without any allegations of additional harm in order to establish standing.</p>
<p>The District Court rejected the plaintiffs’ position because “[n]one of the plaintiffs’ allegations of procedural violations, on their own, demonstrate a material risk of harm to BIPA’s concrete data protection interest because there is no plausible allegation that there is a material risk that plaintiffs’ biometrics may be used in a way not contemplated by the underlying use of the MyPlayer feature.</p>
<p>Additionally, the District Court held the plaintiffs failed to establish that there was “an imminent risk of harm that Take-Two’s storage and dissemination of their facial scans could compromise the data protection interest of the BIPA.” The District Court held the allegations that Take-Two’s practices may have subjected plaintiffs’ facial scans to an “‘enhanced risk of harm’ of somehow falling into the ‘wrong hands’” was too speculative to demonstrate plaintiffs had standing to sue Take-Two.</p>
<p>The District Court also rejected the plaintiffs’ argument that their damages were more than merely “speculative and abstract” by arguing that “face scans are relatively immutable, and, unlike (for example) passwords, cannot be changed.”</p>
<p><strong>Initial Impact of this Decision</strong></p>
<p>One fundamental principle in each section of the District Court’s lengthy opinion is that the plaintiffs scan their own faces in order to create avatars for the video game. And, the plaintiffs failed to allege that the biometric information was used for any purpose other than what plaintiffs had consented. That being said, this will not be the last time a court will be called on to interpret BIPA or similar statutes across the country. It is only a matter of time before data collectors find other uses for biometric information.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/' data-emailit-title='Use of Biometric Data Enters the Courts'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/">Use of Biometric Data Enters the Courts</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/use-of-biometric-data-enters-the-courts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls</title>
		<link>https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2</link>
		<comments>https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/#comments</comments>
		<pubDate>Thu, 22 Dec 2016 18:18:40 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[policy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1056</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/' data-emailit-title='First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>To overcome his anxiety with flying, IOActive’s researcher/author, Ruben Santamarta, began “spending some flights hacking stuff.” In his December 20, 2016 blog post, “In Flight Hacking Systems,” Santamarta describes how he  tried to gain a better understanding of the In-Flight Entertainment... <a class="more-link" href="https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/' data-emailit-title='First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/">First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/' data-emailit-title='First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>To overcome his anxiety with flying, IOActive’s researcher/author, Ruben Santamarta, began “spending some flights hacking stuff.” In his December 20, 2016 blog post, “<a href="http://blog.ioactive.com/2016/12/in-flight-hacking-system.html">In Flight Hacking Systems</a>,” Santamarta describes how he  tried to gain a better understanding of the In-Flight Entertainment Systems (IFE) manufactured by Panasonic Avionics and installed in major airline carriers such as Virgin, KLM and American Airlines. After learning how the IFE operates, <a href="http://www.telegraph.co.uk/technology/2016/12/20/hackers-could-take-control-plane-using-in-flight-entertainment/">other reports </a>indicate Santamarta was able “to hijack in-flight displays to change information such as altitude and location, control cabin lighting and hack into the announcements systems.” Santamarta also claimed he could access the credit card information of frequent flyers’ information stored in the in-flight automatic payment system.</p>
<p>Santamarta’s hacking activities prompt the question of whether he could have hacked the aircraft controls using the IFE as “an attack vector.” Santamarta claims that, depending on the hacker’s abilities, it would be “totally feasible” to take over an aircraft’s controls using the IFE systems as an access point. Santamarta advises airlines to isolate or segregate systems controlling airplane from the IFE systems.</p>
<p>Santamarta’s blog post indicates that many commercial aircraft’s networks are divided into the following “four domains” based on the type of data they handle:  (1) passenger entertainment; (2) passenger owned devices;  (3) airline information services; and (4) aircraft control. Based on his findings, Santamarta believes the best solution to reduce the chances that hackers take control over an aircraft’s controls involves physically isolating these systems from each other; “this means that as long as there is a physical path that connects both domains, we can’t disregard the potential for attack.”</p>
<p>Santamarta concludes the blog post with the following advice, “the responsibility for security does not solely rests with an IFE manufacturer, an aircraft manufacturer or the fleet operator. Each plays an important role in assuring a secure environment.”</p>
<p>In its December 20, 2016 statement, Panasonic disagreed with Santamarta’s findings and has called them “inaccurate and misleading” and further claims the blog post “mixed hypothetical vulnerabilities with specifics about Panasonic’s systems to come up with its results.” Panasonic’s statement also <a href="http://www.ctvnews.ca/sci-tech/in-flight-entertainment-hack-panasonic-rejects-cybersecurity-report-1.3211221" target="_blank">rejects the portion of the report</a> stating that access can be gained to credit card information. Panasonic further offered the reminder that hackers could be criminally charged for trying to access any system on an aircraft.</p>
<p>Regardless of whether Santamarta or Panasonic are correct about the security of IFE systems, Santamarta’s point that the various systems of the aircraft should be completely isolated from each other cannot be overlooked. While common sense tells us that we should not keep the crown jewels in the garage with the gardening tools, it is easy to abandon this common sense approach when it comes to cyber security. In the same way you don’t want the IFE systems providing “an attack vector” to get to an aircraft’s controls, our businesses and homes should not only try to completely avoid a cyber incident, but should limit the amount of damage if a cyber incident takes place.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/' data-emailit-title='First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/">First Class Hack: Researcher Claims Airplane In-Flight Entertainment Systems Give Path to Flight Controls</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/first-class-hack-researcher-claims-airplane-in-flight-entertainment-systems-give-path-to-flight-controls-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach</title>
		<link>https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2</link>
		<comments>https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/#comments</comments>
		<pubDate>Fri, 28 Oct 2016 18:48:05 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=982</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/' data-emailit-title='Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In Camp’s Grocery, Inc. v. State Farm Fire &#38; Cas. Co., 4:16-cv-00204 (October 25, 2016), the U.S. District Court for the Northern District of Alabama granted summary judgment to defendant State Farm and denied plaintiff Camp’s Grocery (Camp’s) cross-motion to... <a class="more-link" href="https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/' data-emailit-title='Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/">Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/' data-emailit-title='Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In <a href="https://privacyriskreport.com/wp-content/uploads/2016/10/Camps-v-State-Farm.pdf"><em>Camp’s Grocery, Inc. v. State Farm Fire &amp; Cas. Co</em>.</a>, 4:16-cv-00204 (October 25, 2016), the U.S. District Court for the Northern District of Alabama granted summary judgment to defendant State Farm and denied plaintiff Camp’s Grocery (Camp’s) cross-motion to establish coverage for a data breach incident under a first party property policy and Inland Marine endorsements.</p>
<p>Camp’s was sued in the underlying litigation when the computer systems at a grocery store it operated in Alabama were hacked and confidential customer data including credit card, debit card and check card information was compromised. The plaintiffs in the underlying lawsuit, three credit unions, alleged that Camp’s breach caused them to suffer damages related to their customers’ accounts, including costs to reissue credit cards, reimbursing customers for losses, lost interest and transaction fees, lost customers, diminished good will and administrative expenses. The credit unions claim Camp’s was liable for these damages because Camp’s failed “to provide adequate computer systems and employee training and/or maintain adequate encryption and intrusion detection and prevention systems.”</p>
<p>While the District Court addressed coverage under two principal sections of the property policy issued by State Farm, the decision is clear in stating that Camp’s argument focused on establishing coverage under two Inland Marine endorsements. Nevertheless, the District Court still addressed whether there was coverage under the first party property and liability sections of the Policy even though Camp’s only attached copies of the Inland Marine endorsements to its complaint.</p>
<p><strong>No Coverage Under </strong><strong>t</strong><strong>he First Party Property Sections </strong><strong>o</strong><strong>f </strong><strong>t</strong><strong>he State Farm Policy </strong></p>
<p>The District Court held there was no coverage under Section I of the Policy entitled “Property.” The insuring clause of Section I stated that State Farm would “pay for accidental direct physical loss to…Covered Property,” which included “Buildings” and “Business Personal Property.” The Policy defined “Business Personal Property” as “Property, used in your business, that you own, lease from other or rent from others, or that is loaned to you,” in addition to “Property of others that is in your care, custody or control….”  However, the Policy further defined “Covered Property to expressly not include “electronic data.”  And, “Accident” was defined as not including “any defect, programming error, programming limitation, computer virus, malicious code, loss of ‘electronic data,’ loss of access, loss of use, loss of functionality or other condition within or involving ‘electronic data’ of any kind.”  Given this policy language, the District Court found there was no coverage for the underlying litigation under Section I.</p>
<p><strong>No Coverage Under </strong><strong>t</strong><strong>he Liability Sections </strong><strong>o</strong><strong>f </strong><strong>t</strong><strong>he State Farm Policy</strong></p>
<p>Likewise, the District Court held there was no coverage under Section II of the Policy entitled “Liability.” The insuring clause of Section II stated that State Farm would pay those sums “the insured becomes legally obligated to pay as damages because of ‘bodily injury,’ ‘property damage,’ or ‘personal and advertising injury’ to which this insurance applies.” The District Court also noted that Section II of the Policy also contained the following provisions related to computers and electronic data:</p>
<p>First, the term “property damage” as used in Section II is limited to liability for harm to “tangible property,” which is defined not to include “electronic data.” And expressly excluded from liability coverage under Section II are “damages arising out of the loss of, damage to, corruption of, inability to access, or inability to manipulate electronic data.”</p>
<p>Based on these provisions, the District Court found the liability section of the Policy was not triggered by the allegations in the underlying litigation.</p>
<p><strong>No Coverage Under </strong><strong>t</strong><strong>he Inland Marine Endorsements</strong></p>
<p>Camp’s central argument was that it was entitled to coverage under two Inland Marine endorsements attached to the Policy entitled “Inland Marine Computer Property Form” and “Inland Marine Conditions.” The Insuring Agreement for the Computer Property Form provides that State Farm will pay for physical loss to “‘computer equipment,’ used in your business operations, that you own, lease from other, or that is loaned to you” and “removable data storage media used in your business operations to store ‘electronic data.’”</p>
<p>State Farm asserted it was entitled to summary judgment because the Computer Property Form is a “first party insuring agreement” and, therefore, does not provide for defense or indemnity against claims brought against Camp’s by a third party related to lost or compromised electronic data. In response, Camp’s argued that even if the Computer Property Form did not contain a defense or indemnity obligation, a provision found in Section II of the Policy (Liability) provides that State Farm assumed a duty to defend and indemnify Camp’s.  That is, Camp’s takes the position that the Inland Marine endorsements “expand the scope of liability insurance coverage” under Section II to require State Farm to provide a defense and indemnity for claims involving computers and electronic data.</p>
<p>In rejecting Camp’s argument, the District Court was persuaded by State Farm’s position that the liability provision in Section II of the Policy “is triggered where the insured becomes legally obligated to pay damages because of bodily injury, property damage or personal and advertising injury.” And, while Camp’s was not claiming the underlying litigation contained any allegations of bodily injury or personal and advertising injury, Camp’s did claim the underlying litigation sought damages for property damage when the credit unions claimed damages to replace credit and debit cards. The District Court rejected Camp’s argument on the basis that Section II of the Policy defines “property damage” as being limited to “tangible property” and the Policy is careful to state “electronic data is not tangible property.” The District Court found “the Credit Unions assert that Camp’s lax computer network security allowed the intangible electronic data contained on the cards to be compromised such that the magnetically encoded card numbers could no longer be used, causing purely economic loss flowing from the need to issue replacement cards with new electronic data.” Further, Section II contained an exclusion for “damages arising out of the loss of, loss of use of, corruption of, inability to access, or inability to manipulate electronic data.” Given these provisions the District Court found there was not coverage for the Credit Union’s claims.</p>
<p>The District Court additionally rejected any attempt by Camp’s to “selectively read[] the Policy in a piecemeal fashion, picking and choosing parts of different coverages that would preclude or exclude their application to the Credit Unions’ claims.”</p>
<p>This decision further demonstrates the need for cyber insurance and how traditional insurance may not offer protection against these emerging claims. Here, despite Camp’s efforts to establish coverage under the various provisions of its property policy, the District Court ultimately finds the various coverage parts to a first party insurance policy cannot be twisted into providing cyber coverage for data breach litigation.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/' data-emailit-title='Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/">Court Rejects Insured’s Attempt at “Selectively Reading” Property Policy to Cover Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/court-rejects-insureds-attempt-at-selectively-reading-property-policy-to-cover-data-breach-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach</title>
		<link>https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach</link>
		<comments>https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/#comments</comments>
		<pubDate>Thu, 09 Jun 2016 17:50:18 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=783</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/' data-emailit-title='The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In 2014, P.F. Chang’s experienced a credit card breach involving a number of its restaurants that culminated in numerous lawsuits nationwide. The ensuing litigation related to this data breach provided significant insight into what would become the important issues in data... <a class="more-link" href="https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/' data-emailit-title='The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/">The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/' data-emailit-title='The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In 2014, P.F. Chang’s experienced a credit card breach involving a number of its restaurants that culminated in numerous lawsuits nationwide. The ensuing litigation related to this data breach provided significant insight into what would become the important issues in data breach litigation moving forward. For example, the <a href="https://privacyriskreport.com/p-f-changs-decision-establishes-7th-circuit-as-friendly-territory-for-data-breach-plaintiffs/">7th Circuit U.S. Court of Appeals held the class representatives’ allegations</a> of fraudulent credit card charges, credit monitoring costs and potential identity theft were sufficient to establish standing to bring suit against P.F. Chang’s for this data breach.</p>
<p>The impact of P.F. Chang’s data breach on insurance coverage law is becoming apparent two years after the breach and as class action plaintiffs are beginning to prosecute their cases. For instance, on May 31, 2016, in <em><a href="https://privacyriskreport.com/wp-content/uploads/2016/06/PFChangs_v_Federal.pdf" target="_blank">P.F. Chang’s China Bistro, Inc. v. Federal Ins. Co.</a></em>, a federal District Court in Arizona issued an order granting Federal Insurance Company’s motion for summary judgment, finding there was no coverage under a cyber policy for P.F. Chang’s breach. The <em>P.F. Chang&#8217;s</em> court stated the central issue in its coverage determination as:  “…whether coverage exists under the insurance policy between Chang’s and Federal for the credit card association assessments that arose from the data breach Chang’s suffered….”</p>
<p>Prior to its analysis of the coverage issues, the order granting summary judgment provides the following background related to P.F. Chang’s claim under the Federal Policy:</p>
<ul>
<li>Federal issued a cyber policy to P.F. Chang’s, effective January 1, 2014, to January 1, 2015.</li>
<li>P.F. Chang’s, as with many merchants, cannot process credit card transactions themselves and, therefore, used “Servicers” who process the transactions with banks that issue the credit cards (Issuers). P.F. Chang’s entered into an agreement with Bank of America (BoA) to process these transactions.</li>
<li>Servicers such as BoA process these transactions and, in turn, must enter into agreements with credit card companies that obligate BoA and banks acting as Issuers to pay fees and assessments to credit card companies if there is a breach.</li>
<li>Under P.F. Chang’s agreement with BoA, P.F. Chang&#8217;s agreed to reimburse BoA for any fees and assessments it was required to pay credit card companies for P.F. Chang’s breach.</li>
<li>After the breach, Federal reimbursed P.F. Chang’s approximately $1.7 million for costs related to forensic investigations and defense of claims arising out of the breach.</li>
</ul>
<p>BoA also sought nearly $2 million in fees and assessments from P.F. Chang’s for amounts it incurred from its agreements with the credit card companies pursuant to P.F. Chang&#8217;s reimbursement agreement with BoA. P.F. Chang’s reimbursed BoA and then sought to recover this amount from Federal under its cyber policy. P.F. Chang&#8217;s initiated this litigation when Federal denied coverage for these amounts. P.F. Chang’s sought coverage under both Insuring Clause A and Insuring Clause B of the cyber policy. The court granted Federal’s motion for summary judgment finding no coverage under either Insuring Clause based on the following reasoning:</p>
<ul>
<li><strong>No Coverage Under Insuring Clause A</strong>: Under the Federal Policy, Insuring Clause A provided that, “[Federal] shall pay for <strong>Loss</strong> on behalf of an <strong>Insured </strong>on account of any <strong>Claim </strong>first made against such <strong>Insured </strong>. . . for <strong>Injury</strong>.” Injury is further defined under the cyber policy to include “Privacy Injury” which “means injury sustained or allegedly sustained by a <strong>Person </strong>because of actual or potential unauthorized access to such <strong>Person’s Record</strong>, or exceeding access to such <strong>Person’s Record</strong>.” The Federal Policy also defines “<strong>Record</strong>” as “any information concerning a natural person that is defined as: (i) private personal information; (ii) personally identifiable information&#8230;pursuant to any federal, state&#8230;statute or regulation,&#8230;where such information is held by an <strong>Insured Organization </strong>or on the <strong>Insured Organization’s </strong>behalf by a <strong>Third Party Service Provider</strong>” or “an organization’s non-public information that is&#8230;in an <strong>Insured’s </strong>or <strong>Third Party Service Provider’s </strong>care, custody, or control.” The court agreed with Federal’s argument on this point that P.F. Chang’s was not entitled to coverage under Insuring Clause A because BoA itself did not sustain a privacy injury because its records were not compromised during the data breach.</li>
<li><strong>There May Be Coverage Under Insuring Clause B: </strong>Under the Federal Policy, Insuring Clause B provides that “[Federal] shall pay Privacy Notification Expenses incurred by an Insured resulting from [Privacy] Injury.” The court agreed with P.F. Chang’s argument that it was entitled to coverage under this provision because of the amounts P.F. Chang’s paid Issuers to reissue bankcards and new account numbers. Even though these fees and assessments may have been incurred by BoA, the court found it persuasive that P.F. Chang’s was ultimately responsible to pay these amounts under its contracts with BoA.</li>
<li><strong>Policy Exclusions Bar Coverage</strong>: Even if there was coverage under Insuring Clause B, the court held two exclusions in the Federal Policy would bar coverage for any contractual obligations P.F. Chang’s assumed from a third party. Specifically, the court agreed with Federal’s argument that the fees and assessments P.F. Chang’s assumed in its contract with BoA were excluded from coverage.</li>
</ul>
<p>As seen on prior occasions, the court’s coverage determination went back to <a href="https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/">basic coverage law</a>. In the <em>P.F. Chang’s </em>decision, the court discusses its reliance on existing coverage law: “In reaching this decision, the court turned to cases analyzing commercial general liability insurance policies for guidance, because cybersecurity insurance policies are relatively new to the market but the fundamental principles are the same.”</p>
<p>It is important to note that Federal paid approximately $1.7 million for P.F. Chang’s damages related to forensic investigations and defense costs. These damages were not at issue under the cyber insurance policy. In short, the cyber policy worked exactly as it was intended to work when there was a data breach. While struggling with the more difficult question (whether the costs P.F. Chang’s became responsible for in its contract with BoA), the court went back to fundamental insurance concepts to find cyber coverage was barred by exclusions for liability assumed from a third party. Therefore, while this decision provides guidance on how courts may be expected to interpret the specific language of a cyber policy, it also demonstrates the importance of the existing body of law related to CGL coverage.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/' data-emailit-title='The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/">The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Spokeo Decision Already Having “Concrete” Impact on Data Breach Class Action Litigation</title>
		<link>https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation</link>
		<comments>https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/#comments</comments>
		<pubDate>Wed, 01 Jun 2016 20:57:01 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[standing]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=767</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/' data-emailit-title='Spokeo Decision Already Having “Concrete” Impact on Data Breach Class Action Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On May 16, 2016, the U.S. Supreme Court issued its opinion in Spokeo v. Robins, a highly-contested circuit court split over the question of how to establish standing in federal courts under Article III. In ruling for the data-gathering company,... <a class="more-link" href="https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/' data-emailit-title='Spokeo Decision Already Having “Concrete” Impact on Data Breach Class Action Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/">Spokeo Decision Already Having “Concrete” Impact on Data Breach Class Action Litigation</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/' data-emailit-title='Spokeo Decision Already Having “Concrete” Impact on Data Breach Class Action Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On May 16, 2016, the U.S. Supreme Court issued its opinion in <em><a href="http://www.supremecourt.gov/opinions/15pdf/13-1339_f2q3.pdf" target="_blank">Spokeo v. Robins</a></em>, a highly-contested circuit court split over the question of how to establish standing in federal courts under Article III. In ruling for the data-gathering company, Spokeo, the Court established that while federal standing requires “injury in fact,” such injury must be both “particular and concrete.” In essence, the <em>Spokeo</em> decision may cause plaintiffs to think twice before filing a complaint based on nothing more than speculation of their damages.</p>
<p>While <em>Spokeo</em> did not involve data breach litigation, many commentators have already wondered if the <em>Spokeo</em> Court’s reasoning would be applied to data breach class actions.</p>
<p>The <em>Spokeo </em>decision potentially has far-reaching consequences as a number of plaintiffs in data breach cases have found <a href="https://privacyriskreport.com/seventh-circuit-weighs-in-on-article-iii-standing-for-data-breach-plaintiffs/" target="_blank">establishing standing to be a difficult hurdle</a> to litigating their cases in federal court. And, the impact of the <em>Spokeo</em> decision on some plaintiffs in data breach class action cases has already begun to show.</p>
<p>For example, on May 18, 2016, two days following the <em>Spokeo </em>decision, the U.S. District Court for the District of Maryland applied the “particular and concrete” test to dismiss a privacy class action in <a href="https://privacyriskreport.com/wp-content/uploads/2016/06/Khan_v_Childrens_National_Health_System051916.pdf" target="_blank"><em><span style="text-decoration: none; text-underline: none;">Kahn v.</span></em> <em><span style="text-decoration: none; text-underline: none;">Children’s National Health System</span></em></a> (CNHS). CNHS maintains private health care records and personal information for those to whom it provides treatment. In July 2014, hackers gained access to the accounts of such individuals, accessing information including names, addresses, birthdates, Social Security numbers and other private health care information. While Kahn – representative to a putative class action – brought claims pursuant to FRCA, she failed to allege any concrete injury. In its decision, the District Court applied the <em>Spokeo </em>test as follows:</p>
<p style="padding-left: 30px;"><em>“Article III standing requires concrete injury even in the context of a statutory violation.” Although Congress may “elevate the status of legally cognizable injuries that are concrete, de facto injuries that were previously inadequate in law, or a ‘bare procedural harm’ under federal statute which are ‘divorced from any concrete harm,’ would not satisfy the injury in-fact requirement.”</em></p>
<p>As seen in the <em>Kahn</em> decision, the impact of <em>Spokeo</em> may be immediate and become a slight disincentive for some plaintiffs to file complaints without specific allegations to meet the threshold of “particularized and concrete.” Consequently, while the impact of <em>Spokeo</em> may be limited, it should initially cause a decline in the number of speculative data breach class action lawsuits filed and cause an increase in the number of data breach cases that may be dismissed via defendants’ motions to dismiss. The full impact of <em>Spokeo</em> will not be known until the 9th U.S. Circuit Court of Appeals has applied the test in the manner required by the U.S. Supreme Court.</p>
<p><em>Tressler LLP law clerk Spencer Lee contributed to this post.</em></p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/' data-emailit-title='Spokeo Decision Already Having “Concrete” Impact on Data Breach Class Action Litigation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/">Spokeo Decision Already Having “Concrete” Impact on Data Breach Class Action Litigation</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/spokeo-decision-already-having-concrete-impact-on-data-breach-class-action-litigation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
